[Lead2pass New] 2017 New Lead2pass CompTIA 220-902 Dumps Free Download (326-350)
Lead2pass 2017 September New CompTIA 220-902 Exam Dumps!
100% Free Download! 100% Pass Guaranteed!
220-902 dumps free share: Lead2pass presents the highest quality of 220-902 exam dump which helps candidates to pass the 220-902 exams in the first attempt.
Following questions and answers are all new published by CompTIA Official Exam Center: https://www.lead2pass.com/220-902.html
A user reports an issue of intermittent Read / Write errors occurring on their PC. Which of the following actions would a technician MOST likely take?
A. Run FDISK on the drive
B. Update definitions and run a virus scan
C. Low level format the drive
D. Run CHKDSK on the drive
A user reports a loud clicking noise coming from their PC, but the PC operates normally. Which of the following actions should the technician perform FIRST when responding to this issue?
A. Attempt to backup data from the hard drive
B. Shutdown the PC and replace the hard drive
C. Format the hard drive and reload the OS
D. Run the disk cleanup utility
Which of the following display types may be practical for a laptop format, but has limited uses due to heat considerations?
Which of the following would be the BEST means of maintaining data security for a mobile device that has been lost or stolen?
A. Login attempt restrictions
B. Locator service
C. Remote wipe
D. Passcode lock
Which of the following steps would allow display output from a laptop to an external display? (Select TWO).
A. Press the appropriate Function Key combination
B. A second video card in the Express card slot
C. Disconnect the integrated display
D. Enabling second monitor in the Windows Display Settings
E. Loading external monitor drivers on the laptop
First enable second monitor in Windows Display settings. After that press the function key along with the assigned key to display the output on an external monitor.
Which of the following allows a hidden backdoor to be used for access to workstations on the Internet?
C. SQL injection
D. Cross-side scripting
Which of the following allows a user to enable XP mode?
A. Windows Vista Home Premium
B. Windows 7 Professional
C. Windows 7 Home Premium
D. Windows Vista Ultimate
A user states they have rebooted the printer and it is displaying “PC load letter”. Which of the following is the MOST likely cause?
A. The printer needs to be rebooted.
B. The printer is out of paper.
C. The fuser needs to be replaced.
D. The toner cartridge is low.
A technician needs to remove the ability of standard users to shut down or restart a shared computer. Which of the following commands can be used to accomplish this task?
A user reports that all print jobs sent to a certain printer that require legal sized paper are not printing. However, standard size paper jobs are printing correctly. A technician checks the paper tray and verifies that it is loaded with legal size paper. Which of the following is the MOST likely cause of the problem?
A. The printer is not designed to print legal sized pages.
B. The print queue is holding jobs from printing.
C. The paper weight is too heavy for the printer.
D. The paper size for the tray is incorrect in the printer setup.
A PC has sensitive data that must be destroyed, before the PC is redeployed. A technician has been tasked with completely wiping the PC hard drive. Which of the following methods is BEST for the technician to use?
A. Quick format
C. Low level format
D. Standard format
An attack that creates a website that looks like another website, with the purpose of learning someone’s account information is called which of the following?
B. Shoulder surfing
A technician is creating a batch script that auto-assigns a particular drive share to a drive letter upon login. Which of the following commands can accomplish this?
A. NET USE
An office of 25 computers is interested in employing a file server, network shares, and print server functionality. Which of the following network setups would be BEST suited for this situation?
D. Token ring
Which of the following terms BEST describes the software or hardware used to manage virtual machines?
B. Cloud Server Manager
D. Virtual Disk Manager
A technician is required to change a setting for HKEY_Local_Machine. Which of the following would the technician use to change this?
B. WEP setup
A technician is working on a PC that utilizes a RAID array for operation. The user of the system has reported that random files are becoming corrupted on creation with no pattern to the activity. One drive in the array is likely failing and causing the read/write failures. Which of the following types of RAID is MOST likely in use?
A. RAID 0
B. RAID 1
C. RAID 5
D. RAID 10
Which of the following Control Panel utilities will allow a technician to change the associated file type in a Windows XP machine?
A. Folder options
B. Administrator tools
C. Accessibility options
D. Regional and language options
Which of the following keys, when pressed immediately after the BIOS test, will display Windows Boot Manager on a Windows 7 PC?
Which of the following Windows 7 versions comes with the LARGEST number of multimedia features?
B. Home Premium
A technician wants to know if a PC has an embedded wireless card. Which of the following tools should be used?
A. Device Manager
B. Component Services
D. System Configuration
A technician notices multiple disk errors in the Event Viewer. Which of the following tools would BEST diagnose this issue?
A small business owner is setting up their wireless network in their office, which is in a building shared with several other businesses. The owner does not want to disable the SSID broadcasting due to visiting customers needing to use the network, but does not want other businesses to notice the network, let alone access it. Which of the following would BEST accomplish this?
A. Configure the access point encryption from unsecured access to WEP.
B. Adjust the radio power so that coverage is restricted to the business.
C. Change the SSID to reflect the business name instead of a public access point.
D. Enable MAC filtering and restrict access to other company’s devices.
Best way to do this is to adjust radio power to restrict the coverage to the business. When the radio power is restricted to an office. The persons in the other office space cannot detect the signals at all.
An administrator is concerned about users accessing network shares outside of their job role.
Which of the following would BEST prevent this?
A. Set up shares with permissions based upon group membership.
B. Implement a written policy addressing the issue for all users.
C. Monitor access to the network shares using SNMP.
D. Prevent remote logins to all network shares and drives.
A company is looking to donate a collection of old PCs that are no longer needed. Which of the following data destruction methods would be MOST secure for highly sensitive information?
A. Simple 1-pass zero overwrite
B. Low level 3-pass random wipe
C. Low level 7-pass random wipe
D. High level format 10 times
More free Lead2pass 220-902 exam new questions on Google Drive: https://drive.google.com/open?id=0B3Syig5i8gpDMU1VNVhHQ08xR1E
Lead2pass is now offering Lead2pass 220-902 PDF dumps with 100% passing guarantee. Use Lead2pass 220-902 PDF and pass your exam easily. Download CompTIA 220-902 exam dumps and prepare for exam.
2017 CompTIA 220-902 (All 1236 Q&As) exam dumps (PDF&VCE) from Lead2pass: